Skip to content

Instantly share code, notes, and snippets.

@Jineeshak
Last active July 1, 2024 05:22
Show Gist options
  • Save Jineeshak/cdef845d74e0cdcc97bade0b19e3b6a5 to your computer and use it in GitHub Desktop.
Save Jineeshak/cdef845d74e0cdcc97bade0b19e3b6a5 to your computer and use it in GitHub Desktop.
metadata:
language: v1-beta
name: "SQLi SUS"
description: "Identify suspicious parameters that could be prone to SQL Injection."
author: "@Jineesh AK"
tags: "SQLi"
given request then
if {latest.request.url} matches "\b(\?|&)(process|string|id|referer|password|pwd|field|view|column|log|sort|from|search|update|cat|row|results|role|table|id|order|filter|user|fetch|limit|keyword|email|query|c|name|where|number|phone_number|delete|report)=\b" then
report issue:
severity: info
confidence: tentative
detail: "Suspicious parameter detected in request. This may be vulnerable to SQL Injection."
remediation: "Validate and sanitize input for the detected parameter to prevent SQL Injection."
end if
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment